Sciweavers

2206 search results - page 329 / 442
» On the power of coercion abstraction
Sort
View
EUROCRYPT
2006
Springer
14 years 1 months ago
Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
Abstract. We present an asymptotically optimal reduction of one-outof-two String Oblivious Transfer to one-out-of-two Bit Oblivious Transfer using Interactive Hashing in conjunctio...
Claude Crépeau, George Savvides
FLOPS
2006
Springer
14 years 1 months ago
Crossing State Lines: Adapting Object-Oriented Frameworks to Functional Reactive Languages
Functional reactive programming integrates dynamic dataflow with functional programming to offer an elegant and powerful model for expressing computations over time-varying values....
Daniel Ignatoff, Gregory H. Cooper, Shriram Krishn...
FOIKS
2006
Springer
14 years 1 months ago
Consistency Checking Algorithms for Restricted UML Class Diagrams
Abstract. Automatic debugging of UML class diagrams helps in the visual specification of software systems because users cannot detect errors in logical inconsistency easily. This p...
Ken Kaneiwa, Ken Satoh
ASIACRYPT
2001
Springer
14 years 1 months ago
Efficient Traitor Tracing Algorithms Using List Decoding
Abstract. We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors. Although much work has focused on constructing traceability schemes,...
Alice Silverberg, Jessica Staddon, Judy L. Walker
CASES
2001
ACM
14 years 1 months ago
Heads and tails: a variable-length instruction format supporting parallel fetch and decode
Abstract. Existing variable-length instruction formats provide higher code densities than fixed-length formats, but are ill-suited to pipelined or parallel instruction fetch and de...
Heidi Pan, Krste Asanovic